Defence Cyber Protection Partnership Cyber Risks Profile Requirements



Similar documents
Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Larry Wilson Version 1.0 November, University Cyber-security Program Controls Book

SANS Top 20 Critical Controls for Effective Cyber Defense

Critical Security Controls

Top 20 Critical Security Controls

ncircle and Core Security: Solutions for Automating the Consensus Audit Guidelines Critical Security Controls

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD Effective Date: April 7, 2005

Defending Against Data Beaches: Internal Controls for Cybersecurity

How To Manage Security On A Networked Computer System

Architecture Overview

Critical Controls for Cyber Security.

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Closing Wireless Loopholes for PCI Compliance and Security

Automate PCI Compliance Monitoring, Investigation & Reporting

SANS Institute First Five Quick Wins

Appalachian Regional Commission Evaluation Report. Table of Contents. Results of Evaluation Areas for Improvement... 2

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Top 20 critical security controls

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP

Concierge SIEM Reporting Overview

Chapter 9 Firewalls and Intrusion Prevention Systems

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

74% 96 Action Items. Compliance

Guideline on Auditing and Log Management

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

Summary of Technical Information Security for Information Systems and Services Managed by NUIT (Newcastle University IT Service)

Supplier Security Assessment Questionnaire

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

Reducing the Cyber Risk in 10 Critical Areas

SolarWinds Security Information Management in the Payment Card Industry: Using SolarWinds Log & Event Manager (LEM) to Meet PCI Requirements

Section 12 MUST BE COMPLETED BY: 4/22

CORE IMPACT AND THE CONSENSUS AUDIT GUIDELINES (CAG)

Achieving PCI-Compliance through Cyberoam

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

Did you know your security solution can help with PCI compliance too?

Lifecycle Solutions & Services. Managed Industrial Cyber Security Services

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

PierianDx - Clinical Genomicist Workstation Software as a Service FAQ s

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified

The Protection Mission a constant endeavor

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

The Critical Security Controls: What s NAC Got to Do with IT?

Global Partner Management Notice

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

Ovation Security Center Data Sheet

How To Protect A Web Application From Attack From A Trusted Environment

Payment Card Industry Self-Assessment Questionnaire

ARCHITECT S GUIDE: Comply to Connect Using TNC Technology

Security Management. Keeping the IT Security Administrator Busy

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

Cyber Security for NERC CIP Version 5 Compliance

ICANWK406A Install, configure and test network security

Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline

GE Measurement & Control. Cyber Security for NEI 08-09

Achieving PCI Compliance Using F5 Products

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

BEST PRACTICES IN CYBER SUPPLY CHAIN RISK MANAGEMENT

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)

Applying the CPNI Top 20 Critical Security Controls in a University Environment

Protecting Your Organisation from Targeted Cyber Intrusion

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

Security Technology: Firewalls and VPNs

Network and Host-based Vulnerability Assessment

Taxonomy of Intrusion Detection System

March

PCI Requirements Coverage Summary Table

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

U06 IT Infrastructure Policy

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

ENTERPRISE IT SECURITY ARCHITECTURE SECURITY ZONES: NETWORK SECURITY ZONE STANDARDS. Version 2.0

Remote Services. Managing Open Systems with Remote Services

Network/Cyber Security

GFI White Paper PCI-DSS compliance and GFI Software products

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting

Locking down a Hitachi ID Suite server

Security. TestOut Modules

All Information is derived from Mandiant consulting in a non-classified environment.

Designing a security policy to protect your automation solution

Implementing SANS Top 20 Critical Security Controls with ConsoleWorks

INCIDENT RESPONSE CHECKLIST

Firewalls, Tunnels, and Network Intrusion Detection

Information Technology Branch Access Control Technical Standard

Lumeta IPsonar. Active Network Discovery, Mapping and Leak Detection for Large Distributed, Highly Complex & Sensitive Enterprise Networks

Vulnerability Management

FIREWALL POLICY DOCUMENT

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

SPEAR PHISHING UNDERSTANDING THE THREAT

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

Approved 12/14/11. FIREWALL POLICY INTERNAL USE ONLY Page 2

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Introduction. Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia

FISMA / NIST REVISION 3 COMPLIANCE

Microsoft Systems Architecture 2.0 (MSA 2.0) Security Review An analysis by Foundstone, Inc.

PCI Compliance - A Realistic Approach. Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM hjoshi@cbiz.com

Transcription:

Good Governance L.01 Define and assign information security relevant roles and responsibilities. L.02 Define and implement a policy that addresses information security risks within supplier relationships. M.01 Define and implement a policy that provides for regular, formal information security related reporting. Culture and Awareness L.03 Define and implement a policy that ensures all functions have sufficient and appropriately qualified resources to manage the establishment, implementation and maintenance of information security. L.04 Define employee (including contractor) responsibilities for information security. M.02 Define and implement a policy to detail specific employee and contractor responsibilities for information security before granting access to sensitive assets. L.05 Define and implement a policy to provide employees and contractors with information security training. Risk Management M.03 Define and implement a policy that provides for repeatable information security risk assessments. L.06 Define and implement a policy for ensuring that sensitive information is clearly identified. M.04 Define and implement a policy for storing, accessing, and handling sensitive information securely. M.05 Define and implement a policy for data loss prevention. L.07 Define and implement a policy to control access to information and information processing facilities. M.06 Ensure that the organisation has identified asset owners and that asset owners control access to their assets. L.08 Maintain Cyber Essentials Scheme Plus certification. H.01 Maintain patching metrics and assess patching performance against policy. H.02 Ensure that wireless connections are authenticated L.09 Define and implement a policy to control the exchanging of information via removable media. L.10 Define and implement an information security policy, related processes and procedures. L.11 Record and maintain the scope and configuration of the information technology estate. Page 1 of 16

M.07 Define and implement a policy to assess vulnerabilities identified for which there are no countermeasures (e.g. a patch) available, undertake risk assessment and management. M.08 Define and implement a policy to monitor network behaviour and review computer security event logs for indications of potential incidents. L.12 Define and implement a policy to manage the access rights of user accounts. H.03 Deploy network monitoring techniques that complement traditional signature-based detection. H.04 Place application firewalls in front of critical servers to verify and validate the traffic going to the server. H.05 Deploy network-based Intrusion Detection System (IDS) sensors on ingress and egress points within the network and update regularly with vendor signatures. M.09 Define and implement a policy to monitor user account usage and to manage changes of access rights. M.10 Define and implement a policy to control remote access to networks and systems. M.11 Define and implement a policy to control the use of authorised software. M.12 Define and implement a policy to control the flow of information through network borders. H.06 Define and implement a policy to control installations of and changes to software on any systems on the network. H.07 Control the flow of traffic through network boundaries and police content by looking for attacks and evidence of compromised machines. M.13 Define and implement a policy to maintain the confidentiality of passwords. H.08 Undertake administration access over secure protocols, using multi-factor authentication. H.09 Design networks incorporating security countermeasures, such as segmentation or zoning. H.10 Ensure Data Loss Prevention (DLP) at network egress points to inspect the contents of and, where necessary, block information being transmitted outside of the network boundary. L.13 Define and implement a policy for verifying an individual s credentials prior to employment. Personnel Security M.14 Define and implement a policy for applying security vetting checks to employees. L.14 Define and implement a process for employees and contractors to report violations of information security policies and procedures without fear of recrimination. L.15 Define and implement a disciplinary process to take action against employees who violate information security policies or procedures. M.15 Undertake personnel risk assessments for all employees and contractors and ensure those with specific responsibilities for information security have sufficient appropriate qualifications and appropriate levels of appropriate experience. M.16 Define and implement a policy to secure organisational assets when individuals cease to be employed by your organisation. Page 2 of 16

Preparing for and Responding to Security Incidents L.16 Define and implement an incident management policy, which must include detection, resolution and recovery. H.11 Proactively verify that the security controls are providing the intended level of security. Page 3 of 16

H.01 Maintain patching metrics and assess patching performance against policy. Patching metrics. < Metrics identified > Further CES Plus requires patching policy. This requirement is to measure performance against this policy. <Review Date> Identify when the performance was last reviewed. Measure the delay in patching new vulnerabilities. Alternative countermeasures should be considered if patches are not available.[csc 4-8] Evaluate critical patches in a test environment before pushing them into production on enterprise systems. If such patches break critical business applications on test machines, the organization must devise other mitigating controls that block exploitation on systems where the patch cannot be deployed because of its impact on business functionality.[csc 4-9] Establish a process to risk-rate vulnerabilities based on the exploitability and potential impact of the vulnerability, and segmented by appropriate groups of assets (example, DMZ servers, internal network servers, desktops, laptops). Apply patches for the riskiest vulnerabilities first. A phased rollout can be used to minimize the impact to the organization. Establish expected patching timelines based on the risk rating level. [CSC 4-10] Page 4 of 16

H.02 Ensure that wireless connections are authenticated Authenticate wireless connections < List Authentication Protocol(s) Used / Not Applicable > Further Page 5 of 16

Some examples of good practice include: The Critical Security Controls For Effective Cyber Defense, Version 5.0, CSC 7, Wireless Access Control Major thefts of data have been initiated by attackers who have gained wireless access to organizations from outside the physical building, bypassing organizations security perimeters by connecting wirelessly to access points inside the organization. Wireless clients accompanying traveling officials are infected on a regular basis through remote exploitation during air travel or in cyber cafes. Such exploited systems are then used as back doors when they are reconnected to the network of a target organization. Still other organizations have reported the discovery of unauthorized wireless access points on their networks, planted and sometimes hidden for unrestricted access to an internal network. Because they do not require direct physical connections, wireless devices are a convenient vector for attackers to maintain long term access into a target environment. Ensure that all wireless traffic leverages at least Advanced Encryption Standard (AES) encryption used with at least Wi- Fi Protected Access 2 (WPA2) protection. [CSC 7-6] Configure network vulnerability scanning tools to detect wireless access points connected to the wired network. Identified devices should be reconciled against a list of authorized wireless access points. Unauthorized (i.e., rogue) access points should be deactivated. [CSC 7-2] Disable peer-to-peer wireless network capabilities on wireless clients, unless such functionality meets a documented business need. [CSC 7-8] Disable wireless peripheral access of devices (such as Bluetooth), unless such access is required for a documented business need. [CSC 7-9] Note: If there is a business need, this must be risk-assessed and approved Ensure that wireless networks use authentication protocols such as Extensible Authentication Protocol-Transport Layer Security (EAP/TLS), which provide credential protection and mutual authentication. [CSC 7-7] For further details visit: https://www.sans.org/media/critical-security-controls/csc-5.pdf BIS 10 Steps to Cyber Security, Network Security Wireless devices should only be allowed to connect to trusted wireless networks. All wireless access points should be secured and security scanning tools should have the ability to detect wireless access points. For further details visit: https://www.gov.uk/government/publications/cyber-risk-management-a-board-level-responsibility Page 6 of 16

H.03 Deploy network monitoring techniques that complement traditional signature-based detection. Network Monitoring Further Evidence would typically include: Frequency of review for security event logs Summary of anomalies identified Remedial action plan BIS 10 Steps to Cyber Security, Monitoring Monitor all ICT systems: Ensure that the solution monitors all networks and host systems (such as clients and servers) potentially through the use of Network and Host Intrusion Detection Systems (NIDS/HIDS) and Prevention Solutions (NIPS/HIPS), supplemented as required by Wireless Intrusion Detection Systems (WIDS) that work in harmony with the wired IDS. These solutions should provide both signature based capabilities to detect known attacks and heuristic capabilities to detect potentially unknown attacks through new or unusual system behaviour. For further details visit: https://www.gov.uk/government/publications/cyber-risk-management-a-board-level-responsibility Page 7 of 16

REQUIREMENTS HIGH Cyber Risk Profile H.04 Place application firewalls in front of critical servers to verify and validate the traffic going to the server. Firewalls and critical servers. Confirmation that critical servers have been identified and firewalls are appropriately placed and configured. Further Any unauthorized services or traffic should be blocked and an alert generated. Place application firewalls in front of any critical servers to verify and validate the traffic going to the server. Any unauthorized services or traffic should be blocked and an alert generated. [CSC 11-7] Page 8 of 16

H.05 Deploy network-based Intrusion Detection System (IDS) sensors on ingress and egress points within the network and update regularly with vendor signatures. Network Monitoring Confirmation that sensors are appropriately placed and configured. (eg via penetration testing). Further Ensure that automated monitoring tools use behaviour-based anomaly detection to complement traditional signature-based detection. [CSC 5-8] Use network-based anti-malware tools to identify executables in all network traffic and use techniques other than signature-based detection to identify and filter out malicious content before it arrives at the endpoint. [CSC 5-9] Configure the built-in firewall session tracking mechanisms included in many commercial firewalls to identify TCP sessions that last an unusually long time. To help identify covert channels exfiltrating data through a firewall. Alert personnel about the source and destination addresses associated with these long sessions. [CSC 13-13] Configure network boundary devices, including firewalls, network-based IPS, and inbound and outbound proxies, to verbosely log all traffic (both allowed and blocked) arriving at the device. [CSC 14-6] For all servers, ensure that logs are written to write-only devices or to dedicated logging servers running on separate machines from the hosts generating the event logs, lowering the chance that an attacker can manipulate logs stored locally on compromised machines. [CSC 14-7] Deploy a SIEM (Security Incident and Event Management) or log analytic tools for log aggregation and consolidation from multiple machines and for log correlation and analysis. Using the SIEM tool, system administrators and security personnel should devise profiles of common events from given systems so that they can tune detection to focus on unusual activity, avoid false positives, more rapidly identify anomalies, and prevent overwhelming analysts with insignificant alerts. [CSC 14-8] Ensure that the log collection system does not lose events during peak activity, and that the system detects and alerts if event loss occurs (such as when volume exceeds the capacity of a log collection system). This includes ensuring that the log collection system can accommodate intermittent or restricted-bandwidth connectivity through the use of handshaking / flow control. [CSC 14-10] Enforce detailed audit logging for access to nonpublic data and special authentication for sensitive data. [CSC 15-3] The IDS should be monitored for alerts. IPS mode should be enabled once normal traffic patterns are understood. Page 9 of 16

H.06 Define and implement a policy to control installations of and changes to software on any systems on the network. Software control Policy <Title> <Issue No> <Issue Date> <Authorised By> <Document Reference> Further Identify the policy that defines how software installation and changes are controlled.. Note: If addressed within a policy for which details are provided elsewhere (against another CSM requirement), simply quote the Policy s Title and cross-reference to the relevant section. <Cross-reference> (see Note) Software Controls < Date of Last Scan for Unapproved Software > < Number of Unapproved Software Configurations Detected> See next page. Page 10 of 16

Examples of software controls include: Perform regular scanning for unauthorized software and generate alerts when it is discovered on a system. This includes alerting when unrecognized binaries (executable files, DLL s and other libraries, etc.) are found on a system, even inside of compressed archives. This includes checking for unrecognized or altered versions of software by comparing file hash values (attackers often utilize altered versions of known software to perpetrate attacks, and file hash comparisons will reveal the compromised software components). Deploy software inventory tools throughout the organization covering each of the operating system types in use, including servers, workstations, and laptops. The software inventory system should track the version of the underlying operating system as well as the applications installed on it. Furthermore, the tool should record not only the type of software installed on each system, but also its version number and patch level. [CSC 2-4] Utilize file integrity checking tools to ensure that critical system files (including sensitive system and application executables, libraries, and configurations) have not been altered. All alterations to such files should be automatically reported security personnel. The reporting system should have the ability to account for routine and expected changes, highlighting unusual or unexpected alterations. [CSC 3-8] Implement and test an automated configuration monitoring system that measures all secure configuration elements that can be measured through remote testing and alerts when unauthorized changes occur. Use features such as those included with tools compliant with Security Content Automation Protocol (SCAP). This includes detecting new listening ports, new administrative users, changes to group and local policy objects, (where applicable), and new services running on a system. [CSC 3-9] Deploy system configuration management tools that will automatically enforce and re-deploy configuration settings to systems at regularly scheduled intervals. Such as Active Directory Group Policy Objects for Microsoft Windows systems or Puppet for UNIX systems. They should be capable of triggering redeployment of configuration settings on a scheduled, manual, or event-driven basis.[csc 3-10] Use automated tools to verify standard device configurations and detect changes. All alterations to such files should be automatically reported to security personnel. [CSC 10-3] Page 11 of 16

H.07 Control the flow of traffic through network boundaries and police content by looking for attacks and evidence of compromised machines. Unauthorised VPN Connections < Date of last scan for unauthorised VPN connections > Further Confirmation of removal of connections and that the vulnerability has been addressed. Boundary control could include: Periodically scan for back-channel connections to the Internet that bypass the DMZ, including unauthorized VPN connections and dual-homed hosts connected to the enterprise network and to other networks via wireless, dial up modems, or other mechanisms.[csc 13-9] Only allow DMZ systems to communicate with private network systems via application proxies or application-aware firewalls over approved channels. To minimize the impact of an attacker pivoting between compromised systems.[csc 13-12] [CSC 17-9] Monitor all traffic leaving the organization and detect any unauthorized use of encryption. Attackers often use an encrypted channel to bypass network security devices. Therefore it is essential that organizations be able to detect rogue connections, terminate the connection, and remediate the infected system. [CSC 17-12] Where applicable, implement Hardware Security Modules (HSMs) for protection of private keys (e.g., for sub CAs) or Key Encryption Keys.[CSC 17-15] Policing options include: CSC 13-4] Deploy network-based IDS sensors on Internet and extranet DMZ systems and networks that look for unusual attack mechanisms and detect compromise of these systems. These network-based IDS sensors may detect attacks through the use of signatures, network behavior analysis, or other mechanisms to analyze traffic [CSC 13-5] Network-based IPS devices should be deployed to complement IDS by blocking known bad signature or behavior of attacks. Network-based IPS devices should be deployed to complement IDS by blocking known bad signature or behavior of attacks. As attacks become automated, methods such as IDS typically delay the amount of time it takes for someone to react to an attack. A properly configured network-based IPS can provide automation to block bad traffic. When evaluating network-based IPS products, include those using techniques other than signaturebased detection (such as virtual machine or sandbox-based approaches) for consideration. Page 12 of 16

H.08 Undertake administration access over secure protocols, using multi-factor authentication. Secure Administration < Number of factors used for authentication of administrators > Further All administrative access is conducted over secure protocols, using multi- factor authentication Controls on administrative access could include: Manage the network infrastructure across network connections that are separated from the business use of that network. Use separate VLANs or, preferably, entirely different physical connectivity for management sessions for network devices. [CSC 10-6] Use multifactor authentication for all administrative access, including domain administrative access. Multi-factor authentication can include a variety of techniques, to include the use of smart cards with certificates, One Time Password (OTP) tokens, and biometrics. [CSC 12-12] When using certificates to enable multi-factor certificate-based authentication, ensure that the private keys are protected using strong passwords or are stored in trusted, secure hardware tokens. [CSC 12-13] Administrators should use different accounts for performing admin roles and normal user roles. Consider the use of password vaulting technology. [CSC 12-14] Page 13 of 16

H.09 Design networks incorporating security countermeasures, such as segmentation or zoning. Secure Network Architecture < Yes, / Not Applicable > Further Confirmation that networks are designed to incorporate security countermeasures, such as segmentation or zoning. Network diagrams should demonstrate this.. Countermeasures could include: Segment the network based on the trust levels of the information stored on the servers. Whenever information flows over a network with a lower trust level, the information should be encrypted. [CSC 15-4] Deploy domain name systems (DNS) in a hierarchical, structured fashion, with all internal network client machines configured to send requests to intranet DNS servers, not to DNS servers located on the Internet. These internal DNS servers should be configured to forward requests they cannot resolve to DNS servers located on a protected DMZ. These DMZ servers, in turn, should be the only DNS servers allowed to send requests to the Internet. [CSC 19-3] All servers and services should be behind a firewall (virtual or physical) and only services required by the end user should be made available. All ports and protocols not required should be disabled. Page 14 of 16

H.10 Ensure Data Loss Prevention (DLP) at network egress points to inspect the contents of and, where necessary, block information being transmitted outside of the network boundary. Data Loss Prevention < Yes, / Not Applicable > Further Confirmation that a Data Loss Prevention tool is deployed (correctly placed and configured) on network egress points (which inspects the contents of and, where necessary, blocks information being transmitted outside of the network boundary). DLP techniques include: Use host-based data loss prevention (DLP) to enforce ACLs even when data is copied off a server. In most organizations, access to the data is controlled by ACLs that are implemented on the server. Once the data have been copied to a desktop system, the ACLs are no longer enforced and the users can send the data to whomever they want. [CSC 15-5] Require multi-factor authentication for accounts that have access to sensitive data or systems. Multi-factor authentication can be achieved using Smart cards with certificates, One Time Password (OTP) tokens, or biometrics. [CSC 16-14] Deploy an automated tool on network perimeters that monitors for certain sensitive information (i.e., personally identifiable information), keywords, and other document characteristics to discover unauthorized attempts to exfiltrate data across network boundaries and block such transfers while alerting information security personnel. [CSC 17-5] Note: PII should be protected at all levels. Ensure users apply a classification to data and email based on the sensitivity. CSC 13-4] Deploy network-based IDS sensors on Internet and extranet DMZ systems and networks that look for unusual attack mechanisms and detect compromise of these systems. These network-based IDS sensors may detect attacks through the use of signatures, network behavior analysis, or other mechanisms to analyze traffic [CSC 13-5] Network-based IPS devices should be deployed to complement IDS by blocking known bad signature or behavior of attacks. Network-based IPS devices should be deployed to complement IDS by blocking known bad signature or behavior of attacks. As attacks become automated, methods such as IDS typically delay the amount of time it takes for someone to react to an attack. A properly configured network-based IPS can provide automation to block bad traffic. When evaluating network-based IPS products, include those using techniques other than signaturebased detection (such as virtual machine or sandbox-based approaches) for consideration. Page 15 of 16

Preparing for and Responding to Security Incidents H.11 Proactively verify that the security controls are providing the intended level of security. Tests and Exercises < Date of last Penetration Test > < Date of next planned Penetration Test > < Date of last Red Team Exercise > Further BIS 10 Steps to Cyber Security, Network Security Conduct regular penetration tests of the network infrastructure and undertake simulated cyber attack exercises to ensure that all security controls have been implemented correctly and are providing the necessary level of security. For further details visit: https://www.gov.uk/government/publications/cyber-risk-management-a-board-level-responsibility Perform periodic Red Team exercises to test organizational readiness to identify and stop attacks or to respond quickly and effectively. [CSC 20-3] Include tests for the presence of unprotected system information and artifacts that would be useful to attackers, including network diagrams, configuration files, older penetration test reports, e-mails or documents containing passwords or other information critical to system operation. [CSC 20-4] Create a test bed that mimics a production environment for specific penetration tests and Red Team attacks against elements that are not typically tested in production, such as attacks against supervisory control and data acquisition and other control systems. [CSC 20-8] Details of companies which can assist with testing and incident recovery can be found at: http://www.cesg.gov.uk/servicecatalogue/service_assurance/check/pages/check.aspx http://www.cesg.gov.uk/servicecatalogue/service_assurance/cir/pages/finding-a-service-provider.aspx Page 16 of 16